This resource is no longer available

Survival Guide: Securing Networks without Borders Show

In today’s era of borderless networks, minimizing your exposure to outside threats is more essential than ever. In this video, find out how to reduce the potential attack surfaces available to data thieves without buying any new hardware or software. Learn the latest methods employed by hackers to gain access to your network and show you how to eliminate these threats.Learn the simple, fundamental steps to take right now to strengthen your network security using the foundational technologies you already have. View this video now to learn about:

How intruders “firewalk” your firewalls and how to stop them

How unused protocols and ports can emit valuable information about your network

Why headend routers have suddenly become the “entry point of choice” for hackers and how to lock them down

Speakers

Robb Boyd
Cisco Solution Expert

Robb Boyd is a 10 year veteran of Cisco starting in the field as a territory sales manager, he is now the Managing Editor and host for the Cisco Interaction Network which currently includes the flagship technical web based TV show: TechWiseTV. These shows have earned multiple awards both within Cisco as well as within the online media industry at large.

Jimmy Ray Purser
Cisco Solution Expert
Jimmy Ray Purser has been an active participant of the information technology (IT) community for more than 19 years, with particular emphasis on local area network (LAN) and wide area network (WAN) infrastructure hacking. He is an active member in the IEEE and the Ethernet Alliance and has an avid following on his blogs, "Networking Geek to Geek" and Network Sheriff.

Vendor:

Cisco Systems, Inc.

Premiered:

Nov 20, 2009

Format:

Multimedia

Type:

Webcast

Language:

English

This resource is no longer available.

More from Related TechTarget Sites

Microsoft's Windows 10 Enterprise makes Windows 8 seem like a distant memory. But should CIOs wait or take the bait? Also in Searchlight, Google uses sensors to fight pollution; Intel's new memory chip breakthrough.

Artificial intelligence has come a long way since SearchCIO columnist Harvey Koeppel studied with some of the discipline's pioneers. He offers 10 steps CIOs must take now to prepare for the AI technology era ahead.

How do organizations gain a competitive edge in today's rapidly evolving tech landscape? With a solid IT strategy plan to guide them, for starters. These IT strategy plan templates and samples will help.

Major IT companies like Black Hat and Google spoke out against the proposed Wassenaar Arrangement rules for cybersecurity software, and those protests have caused the U.S. Dept. of Commerce to commit to drafting new rules.

News roundup: New threats add to the Tor anonymity debate as a new browser aims to take anonymous browsing to the next level. Plus: Android security outlook bad -- or is it?; another Xen host escape flaw; Wassenaar revisions put on hold.